Using Secure Multi Party Computation to Aggregate Sensitive Cybersecurity Defense and Loss Data from Multiple Firms In Order to Understand the Threat Landscape and Guide Firm-Level Security Investment

Some embodiments relate to a system for performing a multi-party computation among a plurality of parties. The system receives encrypted data sets generated by devices associated with the plurality of parties, wherein each of the encrypted data sets is generated by a respective one of the devices by encrypting data using a key shared among the devices. The system performs a computation on an aggregate of the encrypted data sets to obtain an encrypted result of the computation The system transmits the encrypted result of the computation to at least two of the devices. The system receives partially decrypted shares of the encrypted result generated by the at least two devices, wherein each of the partially decrypted shares is generated by a respective one of the at least two devices by partially decrypting the encrypted result using a private key of the respective device. The system generates a decrypted result of the computation using the partially decrypted shares of the encrypted result.

Departments: Dept of Electrical Engineering & Computer Science, Computer Science & Artificial Intelligence Lab, Electrical Eng & Computer Sci, Information Systems & Technology, Sloan School of Management
Technology Areas: Computer Science: Cybersecurity / Industrial Engineering & Automation: Logistics
Impact Areas: Connected World

  • multi-party computation system
    United States of America | Pending

License this technology

Interested in this technology? Connect with our experienced licensing team to initiate the process.

Sign up for technology updates

Sign up now to receive the latest updates on cutting-edge technologies and innovations.

More Technologies